From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-layer Access Control for SDN-Based Telco Clouds, , , и . Secure IT Systems, Springer, (2015)SDN-Guard: Protecting SDN Controllers Against SDN Rootkits, , , , и . Third IEEE International Workshop on Security in NFV-SDN, (2017)Advanced Honeypot-Based Intrusion Detection., , и . login Usenix Mag., (2006)VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching., , , , , , и . CoRR, (2020)EvilCoder: Automated Bug Insertion., и . CoRR, (2020)Static Detection of Uninitialized Stack Variables in Binary Code., , , и . CoRR, (2020)Be the Phisher - Understanding Users' Perception of Malicious Domains., , , и . AsiaCCS, стр. 263-276. ACM, (2020)CollabFuzz: A Framework for Collaborative Fuzzing., , , , , , , и . EuroSec@EuroSys, стр. 1-7. ACM, (2021)Safety, Liveness, and Information Flow: Dependability Revisited., , , , и . ARCS Workshops, том P-81 из LNI, стр. 56-65. GI, (2006)GRIMOIRE: Synthesizing Structure while Fuzzing., , , , , , и . USENIX Security Symposium, стр. 1985-2002. USENIX Association, (2019)